Skip to main content
Skip table of contents

Connection security

Configure HTTPS certificate

A custom certificate that is trusted by all client computers and contains the DNS name of the server should be configured for MyQ Central Server:

The certificate is physically stored in the “C:\ProgramData\MyQ Central Server\Cert” directory in the following files:

  • server.pfx – certificate with both public and private keys

  • server.cer – certificate with the public key

  • server.key – private key

 Usage of wildcard certificates is discouraged, as they pose a much higher security risk when stolen.

Block unencrypted HTTP traffic

Unencrypted HTTP traffic should not be enabled in the MyQ Central Server configuration:

Configuring secure communication in MyQ Easy Config

The host-based firewall should also be configured to only enable HTTPS traffic:

Configuring the host-based firewall
Encrypt database connections

If Microsoft SQL Server is used to store the MyQ database, ensure that TLS encryption is enforced through the SQL Server Configuration Manager:

SQL force encryption

A certificate issued by a trusted CA should also be configured on the SQL Server:

SQL certificate
Enforce encrypted LDAP traffic

If synchronization of user accounts over the LDAP protocol is used, set the connection security to SSL:

LDAP settings in MyQ web UI

For security reasons, do not use START TLS, as it is vulnerable to MITM attacks. A certificate issued by a trusted CA must be configured on all LDAP servers (Active Directory domain controllers).

Secure SMTP traffic

If an SMTP server is configured in MyQ Central Server, enforce the usage of TLS with certificate validation:

Always use FQDN

To prevent MITM attacks, strictly use fully qualified domain names in all configuration windows:

Custom help example

Never contact servers by only typing IP addresses or single-label names.

Secure RADIUS traffic

If RADIUS authentication is used, always generate strong shared secrets that are specific to the MyQ Central Server:

Radius server settings
Protect REST API keys

When REST APIs are used, protect the client secrets from unnecessary exposure and perform periodic secret rollover:

REST API settings in the MyQ web UI

JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.